@TZUTC: 0000
@MSGID: 21:1/999 93485310
@REPLY: 21:1/101 50f81562
@TID: Mystic BBS 1.12 A35
@SEEN-BY: 1/100
And Hi for Northampton Northants in the UK
Geoff
=== Mystic BBS v1.12 A35 (Linux/64)
# Origin: BadTaste-BBS (21:1/999)
--- SBBSecho 3.01-Win32
* Origin: SpaceSST-BBS Fsxnet (21:1/129)
On 10/25/17, bando said the following...
@TZUTC: 0000
@MSGID: 21:1/999 93485310
@REPLY: 21:1/101 50f81562
@TID: Mystic BBS 1.12 A35
@SEEN-BY: 1/100
And Hi for Northampton Northants in the UK
Geoff
=== Mystic BBS v1.12 A35 (Linux/64)
# Origin: BadTaste-BBS (21:1/999)
--- SBBSecho 3.01-Win32
* Origin: SpaceSST-BBS Fsxnet (21:1/129)
So this the first dupe nessage that arrived at 1/100 from 1/129 but interestingly it's presented to MUTIL as a packet from 1:249/206 and contained 59 messages across several echos that were all dupes.
[snip]
+ Oct 26 23:31:30 Extracting 00f8006a.TH0
- Oct 26 23:31:30 unzip -oqqjC "c:\mystfsx\echomail\in\00f8006a.TH0" "*.pkt" -d c:\mystfsx\temputil\
+ Oct 26 23:31:30 Importing 59f1b8e7.pkt (1:249/206 to 21:1/100)
+ Oct 26 23:31:30 Import #34282 to FSX_GEN
+ Oct 26 23:31:30 Export FSX_GEN #34282 to 21:1/101@fsxnet
+ Oct 26 23:31:30 Export FSX_GEN #34282 to 21:1/102@fsxnet
+ Oct 26 23:31:30 Export FSX_GEN #34282 to 21:1/103@fsxnet
+ Oct 26 23:31:30 Export FSX_GEN #34282 to 21:1/104@fsxnet
[snip]
+ Oct 26 23:31:34 Results: 59 echo, 0 net, 0 dupes, 5385 tossed in 4.17s + Oct 26 23:31:34 Shutdown Normal (0)
[snip]
So something is amiss om several levels.
1) 1/129 is burping a packet from 1:249/100 that is addressed to 21:1/100
2) 1/100 is accepting it and tossing it onwards
I suspect 2 may be due to the changes g00r00 has made to the A36 pre I
amd testing... perhaps in freeing up the code to accept the Telegard packet that failed to toss from sPINOZa the other day it's opened the
door too widely?
g00r00 I have a copy of the packet that did was tossed incorrectly if you want it.
Pkt Ver 0002H
Header Type 2+
Product Ver v3.01
No password
Capability 0001H/0100H
I will also cross post this into FSX_MYS
Best, Paul
g00r00 I have a copy of the packet that did was tossed incorrectly if you want it.
g00r00 I have a copy of the packet that did was tossed incorrectly if want it.
Sure please send it over and I'll take a look.
Packet 59f1b8e7
I have saved it with a .TXT extension to avoid it being tossed when it lands at your end, just rename it.
I'm not so sure how to handle this... Mystic enforces the "to address" being valid, but it doesn't enforce the from address because unsecure Netmail will break. There may be other situations as well where you may wish to accept a PKT from a node not in your echomail nodes too.
If you have any opinions please feel free to let me know!
First question that springs to mind is, is there any technical differentiation between echomail and netmail packets? If yes then it may be easier to allow unsecured netmail while enabling an option to allow/deny unsecure echomail.
I do struggle with the idea that echomail from an unknown system and a completely out of zone:net/node address to those stated in Mystic's echomail addresses can be accepted and tossed without challenge.
I think maybe the PKT security needs to stay the way it is now, where the security is based around PKT passwords and authentication by the mailer.
I could add an option like what BBBS has where it will look at the "To" address in each individual message and refuse to toss it if its not a valid echomail node. This doesn't really comply with the FTSC
definition of what can be contained in that field though, but if its an option like BBBS has then I suppose it could be the proper solution.
The downside to this is that it will increase tossing time a bit and possibly increase memory usage a bit...
But if I did the FastEcho method, it'd refuse packets from unsecure netmail that you might want. You're sort of stuck with "all or nothing" with FastEcho.
The BBBS method would allow us to apply that address check only to each individual echomail message, so anything that actually IS valid within
the PKT will still get properly processed, including crashed netmail.
I think I like the way BBBS does it better than FastEcho.
Just trying to process this... so if in the case of the example packet we're looking at that started this thread the 'to' is 21:1/100 and
that's the AKA the 1/100 HUB flies.. then it would toss?
Then there is a from and to address in each message. I was trying to
say that I could check the From address to make sure it is a valid configured echomail node address when tossing echomail. This is what
BBBS does but the FTSC document states that the From address in messages doesn't not HAVE to be the immediate address that sent the PKT, so it
will be an optional feature for this reason. I have not seen any
tossers though that do not put the "senders" address in the message though, so it should work.
Hello all. Quick question. Do I have to add a Dupes message area for
all the dupes to go in? If so, how do I do that for all my networked message areas? Thanks.
Hello all. Quick question. Do I have to add a Dupes message area for
all the dupes to go in? If so, how do I do that for all my networked message areas? Thanks.
Hello all. Quick question. Do I have to add a Dupes message area for
all the dupes to go in? If so, how do I do that for all my networked message areas? Thanks.
I created a new system NET 5 and sent an areafix from it to NET 1 for a full rescan of all echos.
When they landed at NET 5 MUTIL tossed them in but also exported them straight back to NET 1 - not good.
Isn't that the default behavior to any node listed in the "Export To" section of the echo config? As NET5 will see them all as new echomail
and forward them on?
Shouldn't you have removed all "Export To" addresses from NET5, done your rescan, then set up the "Export To" addresses?
Sysop: | sneaky |
---|---|
Location: | Ashburton,NZ |
Users: | 31 |
Nodes: | 8 (0 / 8) |
Uptime: | 201:24:10 |
Calls: | 2,083 |
Calls today: | 1 |
Files: | 11,139 |
Messages: | 947,945 |